desktopchecklist-enduser-2014

2
 Desktop and Portable Computer Standard Securit y Checklist for End-Users Computer identification and location:  _________________________ Completed by (please print):  _______________ ________  Date: ______________  Signature: ________________ _________  Next scheduled review date: ______________  Manager’s signature: __________________ _______  Date: ______________   Al l c om pu ter s t hat con nec t t o t he RIT n etw or k r equ ir e th e fo ll ow in g: Ref. Initials 1. Anti-vir us software (with ma lware si gnature , heurist ic, anti- spyware , reputat ion aware ness) installed and enabled. (1) 2. A firewall , software or hardware, is instal led and enabled. (2) 3. All operating system and application security patches are up to date. (3) 4. Users are aw are that th ey sh ould not leave thei r computer unatten ded without logging off or (4.1) locking the computer first. 5. Compute r is set to automatica lly lock th e scree n when in active for more than 15 minutes. (4.2) 6. Have yo u confirme d with yo ur syste ms admini strator th at an ISO-a pproved Host Intru sion (5) Prevention System is installed and enabled on your machine? 7. Have yo u confirme d with yo ur syste ms admini strator th at ISO-ap proved ho st-based vulne rability management software is installed and enabled on your machine? (Requirement pending product selection.) 8. Have yo u confirme d with yo ur syste ms admini strator th at ISO-approved private information manage ment software is installed and enabled on your machine? (7, 7.4) 9. Scans a re allowe d to compl ete month ly and res ults are re ported ( by the so ftware) to IS O. (7.1, 7.3) 10. No private in formation i s stored on the co mputer. If the softwa re reports any p rivate info rmation , it is immediately remediated. (7.2) 11. Do you access pri vate informa tion on this compu ter? (Y/N) ____________ If No, skip to number 14. 12. Have you confirmed with your systems admin istrato r that whole-d isk encryptio n is insta lled and enabled, and that no user-configurable settings are interfering with the software? (8.1 – 8.2, 8.4) 13. The encrypti on software and its policies are being managed by centralized ISO-ap proved (8.3) security personnel. 14. Have you confirmed with your systems administrator that this computer can be audited from centralized and ISO-approved configuration and software management tools, and that the audit is configured to include applications and patch inventory? (9) 15. Are adminis trator privil eges being us ed on this compute r? (Y/N) ____________ (10) If Yes , who is the dean or VP that has authorized the privileges?  ______________ _____________ RIT Information Security [email protected] https://www.rit.edu/security Creative Commons Share Alike License DesktopChecklist-EndUser-2014.doc 1 of 1 Revised 1/20/15 NA

Upload: bad3106

Post on 05-Nov-2015

214 views

Category:

Documents


0 download

DESCRIPTION

asd

TRANSCRIPT

  • Desktop and Portable Computer Standard Security Checklist for End-Users

    Computer identification and location: _____________________________________________

    Completed by (please print): _______________________ Date: ______________

    Signature: _________________________ Next scheduled review date: ______________

    Managers signature: _________________________ Date: ______________

    All computers that connect to the RIT network require the following: Ref. Initials 1. Anti-virus software (with malware signature, heuristic, anti-spyware, reputation awareness)

    installed and enabled. (1)

    2. A firewall, software or hardware, is installed and enabled. (2)

    3. All operating system and application security patches are up to date. (3)

    4. Users are aware that they should not leave their computer unattended without logging off or (4.1) locking the computer first.

    5. Computer is set to automatically lock the screen when inactive for more than 15 minutes. (4.2)

    6. Have you confirmed with your systems administrator that an ISO-approved Host Intrusion (5) Prevention System is installed and enabled on your machine?

    7. Have you confirmed with your systems administrator that ISO-approved host-based vulnerabilitymanagement software is installed and enabled on your machine? (Requirement pending productselection.)

    8. Have you confirmed with your systems administrator that ISO-approved private information managementsoftware is installed and enabled on your machine? (7, 7.4)

    9. Scans are allowed to complete monthly and results are reported (by the software) to ISO. (7.1, 7.3)

    10. No private information is stored on the computer. If the software reports any private information,it is immediately remediated. (7.2)

    11. Do you access private information on this computer? (Y/N) ____________If No, skip to number 14.

    12. Have you confirmed with your systems administrator that whole-disk encryption is installedand enabled, and that no user-configurable settings are interfering with the software? (8.1 8.2, 8.4)

    13. The encryption software and its policies are being managed by centralized ISO-approved (8.3) security personnel.

    14. Have you confirmed with your systems administrator that this computer can be audited from centralizedand ISO-approved configuration and software management tools, and that the audit is configured toinclude applications and patch inventory? (9)

    15. Are administrator privileges being used on this computer? (Y/N) ____________ (10)

    If Yes, who is the dean or VP that has authorized the privileges? ___________________________

    RIT Information Security [email protected] https://www.rit.edu/security

    Creative Commons Share Alike License DesktopChecklist-EndUser-2014.doc 1 of 1 Revised 1/20/15

    NA